Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Service detection >> DB2 Connection Port Detection


Vulnerability Assessment Details

DB2 Connection Port Detection

Vulnerability Assessment Summary
Detects a DB2 Connection Port

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote host has an open connection port for a DB2 instance.

Description :

The remote host is running DB2, with an open connection port for a DB2
instance. DB2 is a commercial database from IBM, and a connection
port is used by remote clients when connecting to a DB2 server
instance.

See also :

http://www.ibm.com/software/data/db2/
http://www.nessus.org/u?3c362c6e

Solution :

Limit incoming traffic to this port if desired.

Network Security Threat Level:

None

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Obihai OBi200 1-Port VoIP Adapter with Google Voice and Fax Support for Home ...
$90.25
Obihai OBi200 1-Port VoIP Adapter with Google Voice and Fax Support for Home ... pictureYealink Verizon VoIP Phone SIP-T46S Lightly Used Multiple Available
$79.95
Yealink Verizon VoIP Phone SIP-T46S Lightly Used Multiple Available pictureGrandstream GXP1625 Small to Medium Business HD IP Phone with POE VoIP, Black
$38.99
Grandstream GXP1625 Small to Medium Business HD IP Phone with POE VoIP, Black pictureGrandstream GS-GXP2135 Enterprise IpPhone Gigabit Speed 8 Lines VoIP Phone-Black
$72.99
Grandstream GS-GXP2135 Enterprise IpPhone Gigabit Speed 8 Lines VoIP Phone-Black picture


Discussions

No Discussions have been posted on this vulnerability.